About your Search

20130107
20130115
Search Results 0 to 3 of about 4
. >> it is always wonderful to have you here on the show. >> and the f.b.i. said this man tried to bloww up innocent people in oregon. his attorney said he is the victim, next. >>> and astronaut buzz aldrin joins us next. stay with us. i've gotine grams of protein. that's three times more than me! [ female announcer ] ensure clear. nine grams protein. zero fat. in blueberry/pomegranate and peach. for their annual football trip. that's double miles you can actually use. tragically, their ddy got sacked by blackouts. but it's our tradition! that's roughing the card holder. but with the capital one venture card you get double miles you can actually use. [ cheering ] any flight, anytime. the scoreboard doesn't lie. what's in your wallet? hut! i have me on my fantasy team. mom, pop it. ♪ two inches apart, becky. two inches. t-minus nine minutes. [ ding ] [ female announcer ] pillsbury cinnamon rolls. let the making begin. ♪ yeah. then how'd i get this... [ voice of dennis ] ...safe driving bonus check? every six months without an accident, allstate sends a check. ok. [ voice of dennis ] silence. are
by the fbi and i cia couldn't get the results of the interview because they are worried about compromising the investigation. we are going back to treating crime. we don't know who changed the talking points to take al-qaeda references out of the talking points given susan rice three weeks before the election. we don't know anything. i don't want to hold up but i will until we get to the bottom of benghazi. in case the administration is listening to this program you are not going forward on these nominations until you share with the congress with really happened in benghazi. >> shannon: do you have support across the aisle at all for the proposition? i'm sure there are democrats who would also like answers to that question. >> i would be shocked if the democratic party would not at least join in the effort to find out what the president did during the attack, who did change the talking points. why are we now you back to a pre9/11 model of where the fbi can't talk to the cia. i hope they are interested in that. >> shannon: have you been given any timeline for the investigations wrapping up?
is the f.b.i. as the consecutive order to lead the defense against cyber terrorism but companies have come up with ways to thwart attacks. favorite maneuver to feed wrong information to the hackers to make it doubted what they are dealing with, it confuses them and renderers what they get worthless. this is one effort to combat china and russia who is suspected of bringing down critical infrastructure in the united states. >> if this was physical world and paratroopers descended over silicon valley and guys repelled down ropes and went in and grabbed computers and ran out, there would be missiles flying but it happens every day in the cyber security space. where they come and steal everything and off to some other country they go. >> that intellectual property could include plans for weapons systems and products, track is torsion is one target. computer chips and anything that makes america competitive. the sophisticated software that attacks our critical infrastructure is hidden on home computers every day with american citizens to one-day strike. but the better answer the experts say is
. can they help and protect themselves? >> reporter: they can to some extent. the fbi has the executive order to leave -- lead the defense against cyber-terrorism, they keep it a close secret. so companies like cloud strike, have come up with ways to thwart an attack, by feeding the wrong information to the hackers, which makes them doubt what hayare stealing and confuses them and renders the data worthless. this is one effort to combat china and russia, who are suspected of trying to steal america's business secrets or bring down critical structure. >> if this was the physical world and paratroopers descended over silicon valley and guys grabbed computers and ran out twould be missiles flying. but this happens every day in the cyber security space, where adversaries come in and steal everything and off to another country they go. there goes our intellectual property. >> reporter: that can include plans for weapons systems and less leathal products, soda recipes -- anything that makes america competitive. the sophisticated software that attacks our critical infrastructure is hit in the
Search Results 0 to 3 of about 4